1. Ananth, P., Boneh, D., Garg, S., Sahai, A., Zhandry, M.: Differing-inputs obfuscation and applications. Cryptol. ePrint Arch. Rep. 2013, 689 (2013). http://eprint.iacr.org/2013/689
2. Lecture Notes in Computer Science;S Badrinarayanan,2020
3. Lecture Notes in Computer Science;B Barak,2001
4. Bell, J., Bonawitz, K.A., Gascón, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly)logarithmic overhead. Cryptol. ePrint Archive Rep. 2020, 704 (2020). https://eprint.iacr.org/2020/704
5. Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 1175–1191. ACM Press, New York (2017)